Academia.edu no longer supports Internet Explorer.
To browse Academia.edu and the wider internet faster and more securely, please take a few seconds to upgrade your browser.
2021, Procedia Computer Science
…
6 pages
1 file
The Android operating system ranks first in the market share due to the system's smooth handling and many other features that it provides to Android users, which has attracted cyber criminals. Traditional Android malware detection methods, such as signaturebased methods or methods monitoring battery consumption, may fail to detect recent malware. Therefore, we present a novel method for detecting malware in Android applications using Gated Recurrent Unit (GRU), which is a type of Recurrent Neural Network (RNN). We extract two static features, namely, Application Programming Interface (API) calls and Permissions from Android applications. We train and test our approach using CICAndMal2017 dataset. The experimental results show that our deep learning method outperforms several methods with accuracy of 98.2%.
Procedia Computer Science, 2021
Android still has the first rank in terms of market share in comparing to other operating systems. Due to its flexible publishing policy, companies are developing many applications in order to serve user needs. The official market of Android Google Play store is characterized by its support for the unofficial stores, and it does not impose many restrictions on developers during the publishing process. These features were a major reason for making it become the most vulnerable platform to cyber criminals, as users are suffering from the problems of exposure to malicious applications that breach their privacy or damage their devices. In this research, a novel model is devised based on a combination of four static features, namely; permissions, API calls, monitoring system events, and permission rate. Specifically, the dataset consists of 2,820 samples of both malware and benign applications. This paper proposes a new architecture of Recurrent Neural Network (RNN) that can perform the detection process better than traditional machine learning algorithms. The experimental results shown that the proposed model has scored 98.58 level of accuracy, and it has promising results in Android malware detection.
Smartphones and mobile tablets are rapidly becoming indispensable in daily life. Android has been the most popular mobile operating system since 2012. However, owing to the open nature of Android, countless malwares are hidden in a large number of benign apps in Android markets that seriously threaten Android security. Deep learning is a new area of machine learning research that has gained increasing attention in artificial intelligence. In this study, we propose to associate the features from the static analysis with features from dynamic analysis of Android apps and characterize malware using deep learning techniques. We implement an online deep-learning-based Android malware detection engine (DroidDetector) that can automatically detect whether an app is a malware or not. With thousands of Android apps, we thoroughly test DroidDetector and perform an in-depth analysis on the features that deep learning essentially exploits to characterize malware. The results show that deep learning is suitable for characterizing Android malware and especially effective with the availability of more training data. DroidDetector can achieve 96.76% detection accuracy, which outperforms traditional machine learning techniques. An evaluation of ten popular anti-virus softwares demonstrates the urgency of advancing our capabilities in Android malware detection.
IJCSMC, 2018
Android is the predominant mobile operating system for the past few years. The prevalence of devices that can be powered by Android magnetized not merely application developers but also malware developers with criminal intention to design and spread malicious applications that can affect the normal work of Android phones and tablets, steal personal information and credential data, or even worse lock the phone and ask for ransom. Researchers persistently devise countermeasures strategies to fight back malware. One of these strategies applied in the past five years is the use of deep learning methods in Android malware detection. This necessitates a review to inspect the accomplished work in order to know where the endeavors have been established, identify unresolved problems, and motivate future research directions. In this work, an extensive survey of static analysis, dynamic analysis, and hybrid analysis that utilized deep learning methods are reviewed with an elaborated discussion on their key concepts, contributions, and limitations.
Elsevier Ltd, 2020
The Android operating system has been the most popular for smartphones and tablets since 2012. This popularity has led to a rapid raise of Android malware in recent years. The sophistication of Android malware obfuscation and detection avoidance methods have significantly improved, making many traditional malware detection methods obsolete. In this paper, we propose DL-Droid, a deep learning system to detect malicious Android applications through dynamic analysis using stateful input generation. Experiments performed with over 30,0 0 0 applications (benign and malware) on real devices are presented. Furthermore, experiments were also conducted to compare the detection performance and code coverage of the stateful input generation method with the commonly used stateless approach using the deep learning system. Our study reveals that DL-Droid can achieve up to 97.8% detection rate (with dynamic features only) and 99.6% detection rate (with dynamic + static features) respectively which outperforms traditional machine learning techniques. Furthermore, the results highlight the significance of enhanced input generation for dynamic analysis as DL-Droid with the state-based input generation is shown to outperform the existing state-of-the-art approaches.
2018
The pervasiveness of the Android operating system, with the availability of applications almost for everything, is readily accessible in the official Google play store or a dozen alternative third-party markets. Additionally, the vital role of smartphones in modern life leads to store significant information on devices, not only personal information but also corporate information, which attract malware developers to develop applications that can infiltrate user’s devices to steal information and perform harmful tasks. This accompanied with the limitation of currently defenses techniques such as ineffective screening in Google play store, weak or no screening in third-party markets. Antiviruses software that still relies on a signature-based database that is effective only in identifying known malware. To contrive with malicious applications that are increased in volume and sophistication, we propose an Android malware detection system that applies deep learning technique to face the threats of Android malware. Extensive experiments on a real-world dataset contain benign and malicious applications uncovered that the proposed system reaches an accuracy of 95.31%.
Proceedings of the Seventh ACM on Conference on Data and Application Security and Privacy, 2017
In this paper, we propose a novel android malware detection system that uses a deep convolutional neural network (CNN). Malware classification is performed based on static analysis of the raw opcode sequence from a disassembled program. Features indicative of malware are automatically learned by the network from the raw opcode sequence thus removing the need for hand-engineered malware features. The training pipeline of our proposed system is much simpler than existing n-gram based malware detection methods, as the network is trained end-to-end to jointly learn appropriate features and to perform classification, thus removing the need to explicitly enumerate millions of n-grams during training. The network design also allows the use of long n-gram like features, not computationally feasible with existing methods. Once trained, the network can be efficiently executed on a GPU, allowing a very large number of files to be scanned quickly. CCS Concepts •Security and privacy → Malware and its mitigation; Software and application security; •Computing methodologies → Neural networks;
2024
Presentation of Christ in the Temple, drum of the dome 14 remnants of the scene on the southwestern side of the space below the dome 16 remnants of the wall paintings on the southern side of the northwestern opening on the gallery 27 Greek inscription quoting Psalm 33 (detail), cap of the dome head of the archangel Michael before retouching, semi-hemisphere of the altar conch 42 head of the archangel Gabriel, cap of the dome 44 Field with the Greek inscription, an archangel, and two prophets, cap of the dome 50 John the Evangelist, southeastern corner of the space below the dome
The article outlines results of an integrated study of a child skeleton from the Neolithic grave no. 2 of the Ust-Aleika-5 burial ground (Upper Ob region). The skeletal age-at-death of individual is estimated as 2 years ± 8 months. The cranium is characterized by macrocephaly with an open anterior fontanel that is relatively large for this age category. The most probable cause of macrocephaly in this individual is a form of hydrocephalus, but more precise paleopathological diagnosis is problematic. The osteometric characteristics of the clavicles, scapulae, pelvic and long bones rather correspond to the lower limit of the confidence interval of the dental age. Some postcranial measurements may indicate heterochronous biological development, possibly due to observed pathological condition. Based on the discussed cranium 2D facial reconstruction was made. The results of cranial metric analysis and the reconstructed “adult” skull dimensions indicate the probable male sex of the child skeleton. Based on craniometric and dental non-metric traits it can be argued that Ust-Aleika-5 individual demonstrate closest proximity to the autochthonous population of the central regions of Eurasia, in particular, represented by the Neolithic-Eneolithic cranial samples from the Middle Irtysh, Barnaul-Biysk and Novosibirsk-Kamen Ob basin, Barabinsk forest-steppe, as well as the Aral Sea region. Dental anthropological analysis reveals the proximity of Ust-Aleika-5 individual to the Neolithic populations of the south of Western Siberia: from the Baraba burial grounds and foothill areas of the Altai-Sayan region. This analysis suggest that their composition preserved the characteristics of an older than the Neolithic population of the south of Western Siberia, characterized by a mild expression of “eastern” non-metric dental traits and long-term preservation of archaic ones.
International law takes its roots in the ancient religious precept by the most famous name of all, Holland’s Hugo Grotius (1583-1645). He devised the global system of law which originated from the genesis in the early formation of states. There are two important concepts to take into account: the cause of war and the conduct of war. Within the world of international law, there are legal, domestic and international systems that operate by a set of rules that dictate trade, commerce, finance, communication, and travel. The International law came into being because of the intricate relationship between states and their relations to each other. Centuries in the making, international law has shaped the international community, the evolution of globalization, and the expectancy of each state to be interdependent by being aware of their environment and maintain diplomatic relation on human rights. In this research paper, I will draw the line between the international law in regards to the laws of war that seem to supersede the universal standard of acceptance. I will provide concrete examples that support the notion that sometimes international law and the law of wars can be misguided, miscalculated, and blended into-a-out-of-focus concept at the international level that brings conflicts of interests between states. Self-gain and self-interests cause wars to be engaged and world peace to be disturbed based on false assumption and misbehavioral preemptive measures based on irrationality. The spread of democracy worldwide is often threatened by wars. There is a growing body of evidence that the laws of wars could not support wars in general terms to be fought in the first place.
Open Archaeology, 2024
Lettura annuale Ermanno Gorrieri 2018, 2019
Zeitschrift für Gerontologie und Geriatrie, 2007
Earth and Planetary Science Letters, 2013
Journal of Power Sources, 2008
The Iranian Research Letter of Internatinal Politics, 2022
IJASS JOURNAL, 2023
Isla De Arriaran Revista Cultural Y Cientifica, 2006
International Journal of Modern Physics A, 2014